DATE2022
22.4 Formal Methods in Design and Verification of Software and Hardware Systems
- BMC+FUZZ : EFFICIENT AND EFFECTIVE TEST GENERATION
- DOLMEN: FPGA SWARM FOR SAFETY AND LIVENESS VERIFICATION
- ADDING DUAL VARIABLES TO ALGEBRAIC REASONING FOR GATE-LEVEL MULTIPLIER VERIFICATION
- ON THE OPTIMAL OBDD REPRESENTATION OF 2-XOR BOOLEAN AFFINE SPACES
23.1 Artificial Intelligence for embedded systems in healthcare
- BIOFORMERS: EMBEDDING TRANSFORMERS FOR ULTRA-LOW POWER SEMG-BASED GESTURE RECOGNITION
- INCLASS: INCREMENTAL CLASSIFICATION STRATEGY FOR SELF-AWARE EPILEPTIC SEIZURE DETECTION
- AMSER: ADAPTIVE MULTI-MODAL SENSING FOR ENERGY EFFICIENT AND RESILIENT EHEALTH SYSTEMS
23.2 Performance Evaluation & Optimization using Modeling, Simulation & Benchmarking
- A SIMPLE HYBRID MODEL FOR ACCURATE DELAY MODELING OF A MULTI-INPUT GATE
- SYSCIM: SYSTEMC-AMS SIMULATION OF MEMRISTIVE COMPUTATION IN MEMORY
- PIMULATOR: A FAST AND FLEXIBLE PROCESSING-IN-MEMORY EMULATION PLATFORM
- BENQ: BENCHMARKING AUTOMATED QUANTIZATION ON DEEP NEURAL NETWORK ACCELERATORS
23.3 New Methods and Tools using Machine Learning
- GRAPHHD: EFFICIENT GRAPH CLASSIFICATION USING HYPERDIMENSIONAL COMPUTING
- DEEPPM: TRANSFORMER-BASED POWER AND PERFORMANCE PREDICTION FOR ENERGY-AWARE SOFTWARE
- QUANTIZATION-AWARE IN-SITU TRAINING FOR RELIABLE AND ACCURATE EDGE AI
- ENCORE COMPRESSION: EXPLOITING NARROW-WIDTH VALUES FOR QUANTIZED DEEP NEURAL NETWORKS
23.4 Side-channel attacks and beyond
- PREFENDER: A PREFETCHING DEFENDER AGAINST CACHE SIDE CHANNEL ATTACKS AS A PRETENDER
- STEALTHY INFERENCE ATTACK ON DNN VIA CACHE-BASED SIDE-CHANNEL ATTACKS
- KNOW YOUR NEIGHBOR: PHYSICALLY LOCATING XEON PROCESSOR CORES ON THE CORE TILE GRID
- REVEAL: SINGLE-TRACE SIDE-CHANNEL LEAKAGE OF THE SEAL HOMOMORPHIC ENCRYPTION LIBRARY